- Dahhak Hajar, Nadia Afifi, Imane Hilal. Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience. Cryptography, 9(2):22, 2025.
- Marta Irene García Cid, Rodrigo Martín, David Domingo, Vicente Martín, Laura Ortíz. Design and Implementation of a Quantum-Assisted Digital Signature. Cryptography, 9(1):11, 2025.
- Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong. Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework. Cryptography, 9(1):18, 2025.
- Thekaa Ali Kadhim, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi, Zahraa Abdullah Ali, Iman Qays Abduljaleel. Lightweight Scheme for Secure Signaling and Data Exchanges in Intelligent Precision Agriculture. Cryptography, 9(1):7, 2025.
- Rares Ifrim, Decebal Popescu. BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis. Cryptography, 9(1):20, 2025.
- Phuc-Phan Duong, Tuan-Kiet Dang, Trong-Thuc Hoang, Cong-Kha Pham. Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24). Cryptography, 9(2):21, 2025.
- Xiansong Qian, Lifei Wei, Jinjiao Zhang, Lei Zhang 0080. Malicious-Secure Threshold Multi-Party Private Set Intersection for Anonymous Electronic Voting. Cryptography, 9(2):23, 2025.
- Xiaoqi Liu, Guillermo Morales-Luna. On the Effectiveness of a Common Attack to Chebyshev Chaotic Encryption Scheme. Cryptography, 9(1):10, 2025.
- Kung-Wei Hu, Huan-Chih Wang, Wun-Ting Lin, Ja-Ling Wu. Optimizing Message Range and Ciphertext Storage in Gentry-Sahai-Waters Encryption Using Chinese Remainder Theorem and PVW-like Compression Scheme. Cryptography, 9(1):14, 2025.
- Hsia-Hung Ou, Guan-Yu Chen, Iuon-Chang Lin. A Self-Sovereign Identity Blockchain Framework for Access Control and Transparency in Financial Institutions. Cryptography, 9(1):9, 2025.